I just ran across a very good video from IBM which explains the "GRC" market segment and introduces the IBM OpenPages product. It seems to be HTML5 based and I can't fugure out how to embed it. But I highly recommend following the link and watching...

The news reports from about the alleged cheating scandals at the Atlanta Public School system reminded me of a news story I had flagged to go look at later as a possible example of an IT security story to post here. Looking back in my archives, the story was...

In September, the Office of the Information and Privacy
Commissioner in Ontario Canada released
a case study report titled “ Privacy
by Design: From Policy to Practice ” which describes an overview of the
three pillars of IBM’s internal privacy management...

Wired Magazine has been working an exclusive story over the
past few days about a key logger
virus affecting the network the US Air Force uses to control its drone program .
Citing a “source familiar with the network infection,” it’s unknown whether...

Is Apple's screening process a reasonable control against malware on an iPad? Was hanging out with some friends at The Open Eye , Carrboro's legendary coffee shop the other day and my friend, J., was telling me about the latest app he had for sale at the...

The PCI Security
Standards Council recently released their PCI
DSS Tokenization Guidelines , which has consequently sparked much
discussion about how to decide when/if company should consider
implementing a tokenization structure to improve the security...

GoUpstate.com , a regional news site for the Spartanburg, SC area, posted a story on May 27th, 2011 titled " Spartanburg Regional patients affected by computer breach " which reported that an employee of the Spartanburg Regional Healthcare System had...

On this episode, a new Operational Risk Taxonomy from CMU's SEI, the Bastardization of Cyberspace, and Cloud Computing as Data Protection Control.
Download Operational Risk Taxonomies CMU SEI recently released a paper outlining a...

IBM Global Technology Services just released a report written by
the Economist Intelligence Unit summarizing the findings of a survey
that investigates how organizations are developing their business
resiliency strategies. “ Key
trends driving global...

Many IT security folks have been
following the case of Patco Construction Company, Inc. vs. People's
United Bank in the United States District Court of Maine. As I
understand the current state of the case, a magistrate judge has
issued a recommended...

Credit.com has a story about the Morgan Stanley Data Breach that happened a few weeks ago and I'd like to make two observations about the incident because I think it highlights an often overlooked security control, the chain of custody control. First let's...

IBM's Smarter Planet Initiative is all about making real world things "instrumented, intelligent, and interconnected." So I'm always on the look out for security stories about the real-world things that have IT capabilities. So I was very interested...

Tom Cross talks about the Secure Open Wireless Access prototype.
Click the player above or download here .
-- Introductions My guest is Tom Cross, Manager of X-Force strategy and Threat Intelligence Visit the Frequency X Blog to read more about the work...